Archives

TechBytes

Running Google Chrome on Citrix XenApp and XenDesktop

We’ve Moved! Update your Reader Now.

This feed has moved to: http://feeds.feedblitz.com/citrix

Update your reader now with this changed subscription address to get your latest updates from us.

Continue reading..

Running Google Chrome on Citrix XenApp and XenDesktop

We’ve Moved! Update your Reader Now.

This feed has moved to: http://feeds.feedblitz.com/citrix

Update your reader now with this changed subscription address to get your latest updates from us.

Continue reading..

Customizing the Windows 10 Start Menu to Enable Better Control, Better Experience

We’ve Moved! Update your Reader Now.

This feed has moved to: http://feeds.feedblitz.com/citrix

Update your reader now with this changed subscription address to get your latest updates from us.

Continue reading..

How to Optimize HDX Bandwidth Utilization

We’ve Moved! Update your Reader Now.

This feed has moved to: http://feeds.feedblitz.com/citrix

Update your reader now with this changed subscription address to get your latest updates from us.

Continue reading..

Modern Management with XenMobile — Connectivity Focus

We’ve Moved! Update your Reader Now.

This feed has moved to: http://feeds.feedblitz.com/citrix

Update your reader now with this changed subscription address to get your latest updates from us.

Continue reading..

XenServer Plugins Collection v6

When I talk to developers, my favorite questions to ask them are “How are you using your own product?” or “Have you ever used it in a production environment?”

In my experience, if the answer is “yes,” the final software …


  

Related Stories

Continue reading..

How Women Formed the Computer Programming Industry

As a presenter, one of my favorite topics this year has been talking about the future of IT security. Where are we heading? What are the implications? What will IT security look like in the future?

If I could summarize …


  

Related Stories

Continue reading..

Cryptojacking – How to Avoid This Digital Parasite

How cryptojacking came to be, what to watch out for, and how Citrix can help you avoid it like the plague!

Cryptojacking targets both endpoints and servers - both on-premises and in the cloud. The goal is the same: enslave …


  

Related Stories

Continue reading..

Meltdown and Spectre: Understanding the Performance Impact, Current State & What’s Next

Over the last couple of weeks, everyone in the IT industry has been keeping a close eye on a new class of security attacks that are taking advantage of a design flaw in modern computer processors. This is an industry-wide …


  

Related Stories

Continue reading..

On the Origin of Ransomware Species

It is not the strongest of the species that survives, nor the most intelligent, but the one that’s most responsive to change.

In the IT world, one of the best examples of perpetual change is security, especially the darker side …


  

Related Stories

Continue reading..

Go Que Newsroom Categories

Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 53 bytes) in /home/content/36/8658336/html/goquecom/wp-includes/wp-db.php on line 1889